0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Kismet Hacking (Paperback): Frank Thornton, Michael J. Schearer, Brad Haines Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
R1,154 Discovery Miles 11 540 Ships in 10 - 15 working days

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Seven Deadliest Wireless Technologies Attacks (Paperback): Brad Haines Seven Deadliest Wireless Technologies Attacks (Paperback)
Brad Haines
R539 R476 Discovery Miles 4 760 Save R63 (12%) Ships in 10 - 15 working days

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Why Did God Make Me Like This?
Emily A Weaver Hardcover R626 Discovery Miles 6 260
Recent Developments on Peak Limestone
Mark Pretty Paperback R234 Discovery Miles 2 340
Physical Security Systems Handbook - The…
Michael Khairallah Hardcover R1,400 Discovery Miles 14 000
Many Worlds to Conquer
Tj Halbertsma Hardcover R678 Discovery Miles 6 780
Introduction to Security Reduction
Fuchun Guo, Willy Susilo, … Hardcover R4,891 Discovery Miles 48 910
Luna Howls at the Moon
Kristin O'Donnell Tubb Paperback R185 Discovery Miles 1 850
Being Noah
Cheryl Hardy Hardcover R586 R535 Discovery Miles 5 350
Beautifully and Wonderfully Made
Eve Francis Hardcover R562 R516 Discovery Miles 5 160
Our Service Dogs
Amber Diane Hill Hardcover R563 Discovery Miles 5 630
The Manager's Handbook for Corporate…
Gerald L. Kovacich, Edward Halibozek Hardcover R1,663 Discovery Miles 16 630

 

Partners